Phishing
| Id | c3771865-b647-46a7-9be5-a96c418cebc0 |
| Rulename | Phishing |
| Description | New phishing with severity High found |
| Severity | High |
| Tactics | InitialAccess Discovery |
| Techniques | T1566 T1087 |
| Required data connectors | CBSPollingIDAzureFunctions |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml |
| Version | 1.0.4 |
| Arm template | c3771865-b647-46a7-9be5-a96c418cebc0.json |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
description: |
'New phishing with severity High found'
version: 1.0.4
triggerThreshold: 0
tactics:
- InitialAccess
- Discovery
suppressionEnabled: false
suppressionDuration: 5h
queryPeriod: 5m
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/CTM360/Analytic Rules/Phishing.yaml
triggerOperator: gt
status: Available
eventGroupingSettings:
aggregationKind: SingleAlert
id: c3771865-b647-46a7-9be5-a96c418cebc0
name: Phishing
queryFrequency: 5m
severity: High
incidentConfiguration:
createIncident: true
groupingConfiguration:
reopenClosedIncident: false
lookbackDuration: PT5H
enabled: false
matchingMethod: AllEntities
kind: Scheduled
entityMappings:
- fieldMappings:
- columnName: subject_s
identifier: Url
entityType: URL
relevantTechniques:
- T1566
- T1087
query: |
CBSLog_Azure_1_CL | where severity_s == "High" | where type_s == "Phishing" | where status_s != "Closed" or status_s != "Resolved"
requiredDataConnectors:
- dataTypes:
- CBSLog_Azure_1_CL
connectorId: CBSPollingIDAzureFunctions